IT Governance, Risk, and Compliance:

May, 2009

1

May 29, 2009  7:40 PM

Digital Rights Management – Part I



Posted by: Robert Davis
IAP, Information Asset Protection, Information Security Governance, Intellectual Property Right, Internet, Internet Governance, IPR, ISG, Trust Management

Intellectual property right (IPR) issues affect Information Security Governance as well as Internet Governance deployments through a direct impact on '

May 26, 2009  6:14 PM

Electronic Commerce – Part IV



Posted by: Robert Davis
B2B, B2C, B2E, B2G, Business-to-Business, Business-to-Consumer, Business-to-Employee, Business-to-Government, E-commerce, EDI, Electronic Commerce, Electronic Data Interchange, Internet, Message Integrity, PKI, Public Key Infrastructure, UCC, Uniform Commercial Code

EDI is commonly defined as the transfer of data between different companies utilizing networks. For the vast majority of entities, enhanced transactional traceability, reliability, and accessibility are derived EDI benefits; but without appropriate...

Bookmark and Share     0 Comments     RSS Feed     Email a friend


May 22, 2009  7:00 PM

Electronic Commerce – Part III



Posted by: Robert Davis
B2B, B2C, B2E, B2G, Business-to-Business, Business-to-Consumer, Business-to-Employee, Business-to-Government, E-commerce, EDI, Electronic Commerce, Electronic Data Interchange, Internet, Message Integrity, UCC, Uniform Commercial Code

EDI between trading partners can be interpreted as legally binding contracts. For instance, when a transaction is initiated by one of the trading partners, such as a purchase order, it constitutes an "offer". In turn, if a trading partner agrees to supply the merchandise requested, it normally is...


May 19, 2009  7:52 PM

Electronic Commerce – Part II



Posted by: Robert Davis
B2B, B2C, B2E, B2G, Business-to-Business, Business-to-Consumer, Business-to-Employee, Business-to-Government, E-commerce, EDI, Electronic Commerce, Electronic Data Interchange, Internet

Delineated, B2B is E-commerce between discernibly distinct entities. B2B links enable the exchange of products, services, or information between entities. Cascading down, Electronic Data Interchange (EDI) methodologies are the precursors and pillars of Internet integrated B2B relationships....


May 15, 2009  6:48 PM

Electronic Commerce – Part I



Posted by: Robert Davis
B2B, B2C, B2E, B2G, Business-to-Business, Business-to-Consumer, Business-to-Employee, Business-to-Government, E-commerce, Electronic Commerce, Internet

With an ever-increasing number of organizations and individuals relying on the Internet to exchange confidential and sensitive information, adequate message security continues to be a technological management concern. Serviceable standard electronic commerce (E-commerce) models include...


May 12, 2009  3:25 PM

Developing Objectives – Part IV



Posted by: Robert Davis
Accountability, Behavioral Management, Benchmarking, Goals, IAP, Information Asset Protection, Information Security Governance, Information Security Management, ISG, ISM, Management by Objectives, MBO, Planning Committee, Resource Allocation, Responsibility

MBO is a participative behavioral approach to managing employees. One of the primary MBO assumptions is that employees prefer to work hard once they are provided with employer expectations. Intuitively, sustaining accepted expectations...


May 7, 2009  11:14 PM

Developing Objectives – Part III



Posted by: Robert Davis
Accountability, Behavioral Management, Benchmarking, Goals, IAP, Information Asset Protection, Information Security Governance, Information Security Management, ISG, ISM, Management by Objectives, MBO, Planning Committee, Resource Allocation, Responsibility

A system for disseminating information security management objectives is considered fundamental to obtain employee commitment. One way to communicate entity-centric information security objectives is clear and concise policies. Information security...

Bookmark and Share     0 Comments     RSS Feed     Email a friend


May 4, 2009  6:32 PM

Developing Objectives – Part II



Posted by: Robert Davis
Accountability, Behavioral Management, Benchmarking, Goals, IAP, Information Asset Protection, Information Security Governance, Information Security Management, ISG, ISM, Management by Objectives, MBO, Planning Committee, Resource Allocation, Responsibility

Within behavioral management theory, entity leaders have alternative approaches available to accomplish information assets safeguarding objectives development -- including participative, consultative, free rein, and autocratic models....


1

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: